blob: f22915120dda3f8179648b1e7a56fcd6a6e98f48 [file] [log] [blame]
Paul Bakker8123e9d2011-01-06 15:37:30 +00001/**
Chris Jonesdaacb592021-03-09 17:03:29 +00002 * \file cipher_wrap.h
Paul Bakker9af723c2014-05-01 13:03:14 +02003 *
Paul Bakker8123e9d2011-01-06 15:37:30 +00004 * \brief Cipher wrappers.
5 *
6 * \author Adriaan de Jong <dejong@fox-it.com>
Darryl Greena40a1012018-01-05 15:33:17 +00007 */
8/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02009 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +000010 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Paul Bakker8123e9d2011-01-06 15:37:30 +000011 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020012#ifndef MBEDTLS_CIPHER_WRAP_H
13#define MBEDTLS_CIPHER_WRAP_H
Paul Bakker8123e9d2011-01-06 15:37:30 +000014
Bence Szépkútic662b362021-05-27 11:25:03 +020015#include "mbedtls/build_info.h"
Manuel Pégourié-Gonnard6c5abfa2015-02-13 14:12:07 +000016
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010017#include "mbedtls/cipher.h"
Paul Bakker8123e9d2011-01-06 15:37:30 +000018
Hanno Becker6118e432018-11-09 16:47:20 +000019#if defined(MBEDTLS_USE_PSA_CRYPTO)
20#include "psa/crypto.h"
21#endif /* MBEDTLS_USE_PSA_CRYPTO */
22
Paul Bakker8123e9d2011-01-06 15:37:30 +000023#ifdef __cplusplus
24extern "C" {
25#endif
26
Valerio Settidb1ca8f2023-10-11 12:46:16 +020027/* Support for GCM either through Mbed TLS SW implementation or PSA */
28#if defined(MBEDTLS_GCM_C) || \
29 (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_GCM))
Valerio Settidcee9872023-10-16 11:35:57 +020030#define MBEDTLS_CIPHER_HAVE_GCM_VIA_LEGACY_OR_USE_PSA
Valerio Settidb1ca8f2023-10-11 12:46:16 +020031#endif
32
33#if (defined(MBEDTLS_GCM_C) && defined(MBEDTLS_AES_C)) || \
34 (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_GCM) && defined(PSA_WANT_KEY_TYPE_AES))
Valerio Settidcee9872023-10-16 11:35:57 +020035#define MBEDTLS_CIPHER_HAVE_GCM_AES_VIA_LEGACY_OR_USE_PSA
Valerio Settidb1ca8f2023-10-11 12:46:16 +020036#endif
37
38#if defined(MBEDTLS_CCM_C) || \
39 (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CCM))
Valerio Settidcee9872023-10-16 11:35:57 +020040#define MBEDTLS_CIPHER_HAVE_CCM_VIA_LEGACY_OR_USE_PSA
Valerio Settidb1ca8f2023-10-11 12:46:16 +020041#endif
42
43#if (defined(MBEDTLS_CCM_C) && defined(MBEDTLS_AES_C)) || \
44 (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CCM) && defined(PSA_WANT_KEY_TYPE_AES))
Valerio Settidcee9872023-10-16 11:35:57 +020045#define MBEDTLS_CIPHER_HAVE_CCM_AES_VIA_LEGACY_OR_USE_PSA
Valerio Settidb1ca8f2023-10-11 12:46:16 +020046#endif
47
48#if defined(MBEDTLS_CCM_C) || \
49 (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CCM_STAR_NO_TAG))
Valerio Settidcee9872023-10-16 11:35:57 +020050#define MBEDTLS_CIPHER_HAVE_CCM_STAR_NO_TAG_VIA_LEGACY_OR_USE_PSA
Valerio Settidb1ca8f2023-10-11 12:46:16 +020051#endif
52
Valerio Settia6c07612023-10-12 18:48:24 +020053#if (defined(MBEDTLS_CCM_C) && defined(MBEDTLS_AES_C)) || \
54 (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CCM_STAR_NO_TAG) && \
55 defined(PSA_WANT_KEY_TYPE_AES))
56#define MBEDTLS_CIPHER_HAVE_CCM_STAR_NO_TAG_AES_VIA_LEGACY_OR_USE_PSA
57#endif
58
Valerio Settidb1ca8f2023-10-11 12:46:16 +020059#if defined(MBEDTLS_CHACHAPOLY_C) || \
60 (defined(MBEDTLS_USE_PSA_CRYPTO) && defined(PSA_WANT_ALG_CHACHA20_POLY1305))
Valerio Settidcee9872023-10-16 11:35:57 +020061#define MBEDTLS_CIPHER_HAVE_CHACHAPOLY_VIA_LEGACY_OR_USE_PSA
Valerio Settidb1ca8f2023-10-11 12:46:16 +020062#endif
63
Valerio Settidcee9872023-10-16 11:35:57 +020064#if defined(MBEDTLS_CIPHER_HAVE_GCM_VIA_LEGACY_OR_USE_PSA) || \
65 defined(MBEDTLS_CIPHER_HAVE_CCM_VIA_LEGACY_OR_USE_PSA) || \
66 defined(MBEDTLS_CIPHER_HAVE_CCM_STAR_NO_TAG_VIA_LEGACY_OR_USE_PSA) || \
67 defined(MBEDTLS_CIPHER_HAVE_CHACHAPOLY_VIA_LEGACY_OR_USE_PSA)
68#define MBEDTLS_CIPHER_HAVE_SOME_AEAD_VIA_LEGACY_OR_USE_PSA
Valerio Settidb1ca8f2023-10-11 12:46:16 +020069#endif
70
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +010071/**
72 * Base cipher information. The non-mode specific functions and values.
73 */
Gilles Peskine449bd832023-01-11 14:50:10 +010074struct mbedtls_cipher_base_t {
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +010075 /** Base Cipher type (e.g. MBEDTLS_CIPHER_ID_AES) */
76 mbedtls_cipher_id_t cipher;
77
78 /** Encrypt using ECB */
Gilles Peskine449bd832023-01-11 14:50:10 +010079 int (*ecb_func)(void *ctx, mbedtls_operation_t mode,
80 const unsigned char *input, unsigned char *output);
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +010081
82#if defined(MBEDTLS_CIPHER_MODE_CBC)
83 /** Encrypt using CBC */
Gilles Peskine449bd832023-01-11 14:50:10 +010084 int (*cbc_func)(void *ctx, mbedtls_operation_t mode, size_t length,
85 unsigned char *iv, const unsigned char *input,
86 unsigned char *output);
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +010087#endif
88
89#if defined(MBEDTLS_CIPHER_MODE_CFB)
90 /** Encrypt using CFB (Full length) */
Gilles Peskine449bd832023-01-11 14:50:10 +010091 int (*cfb_func)(void *ctx, mbedtls_operation_t mode, size_t length, size_t *iv_off,
92 unsigned char *iv, const unsigned char *input,
93 unsigned char *output);
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +010094#endif
95
Simon Butcher8c0fd1e2018-04-22 22:58:07 +010096#if defined(MBEDTLS_CIPHER_MODE_OFB)
97 /** Encrypt using OFB (Full length) */
Gilles Peskine449bd832023-01-11 14:50:10 +010098 int (*ofb_func)(void *ctx, size_t length, size_t *iv_off,
99 unsigned char *iv,
100 const unsigned char *input,
101 unsigned char *output);
Simon Butcher8c0fd1e2018-04-22 22:58:07 +0100102#endif
103
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100104#if defined(MBEDTLS_CIPHER_MODE_CTR)
105 /** Encrypt using CTR */
Gilles Peskine449bd832023-01-11 14:50:10 +0100106 int (*ctr_func)(void *ctx, size_t length, size_t *nc_off,
107 unsigned char *nonce_counter, unsigned char *stream_block,
108 const unsigned char *input, unsigned char *output);
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100109#endif
110
Jaeden Ameroc6539902018-04-30 17:17:41 +0100111#if defined(MBEDTLS_CIPHER_MODE_XTS)
112 /** Encrypt or decrypt using XTS. */
Gilles Peskine449bd832023-01-11 14:50:10 +0100113 int (*xts_func)(void *ctx, mbedtls_operation_t mode, size_t length,
114 const unsigned char data_unit[16],
115 const unsigned char *input, unsigned char *output);
Jaeden Ameroc6539902018-04-30 17:17:41 +0100116#endif
117
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100118#if defined(MBEDTLS_CIPHER_MODE_STREAM)
119 /** Encrypt using STREAM */
Gilles Peskine449bd832023-01-11 14:50:10 +0100120 int (*stream_func)(void *ctx, size_t length,
121 const unsigned char *input, unsigned char *output);
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100122#endif
123
124 /** Set key for encryption purposes */
Gilles Peskine449bd832023-01-11 14:50:10 +0100125 int (*setkey_enc_func)(void *ctx, const unsigned char *key,
126 unsigned int key_bitlen);
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100127
Yanray Wangb67b4742023-10-31 17:10:32 +0800128#if !defined(MBEDTLS_BLOCK_CIPHER_NO_DECRYPT)
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100129 /** Set key for decryption purposes */
Gilles Peskine449bd832023-01-11 14:50:10 +0100130 int (*setkey_dec_func)(void *ctx, const unsigned char *key,
131 unsigned int key_bitlen);
Yanray Wangdb9b3092023-08-24 15:47:53 +0800132#endif
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100133
134 /** Allocate a new context */
Gilles Peskine449bd832023-01-11 14:50:10 +0100135 void * (*ctx_alloc_func)(void);
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100136
137 /** Free the given context */
Gilles Peskine449bd832023-01-11 14:50:10 +0100138 void (*ctx_free_func)(void *ctx);
Manuel Pégourié-Gonnard5a74e8b2015-05-06 17:10:55 +0100139
140};
141
Gilles Peskine449bd832023-01-11 14:50:10 +0100142typedef struct {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200143 mbedtls_cipher_type_t type;
144 const mbedtls_cipher_info_t *info;
145} mbedtls_cipher_definition_t;
Paul Bakker8123e9d2011-01-06 15:37:30 +0000146
Hanno Becker6118e432018-11-09 16:47:20 +0000147#if defined(MBEDTLS_USE_PSA_CRYPTO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100148typedef enum {
Hanno Becker19086552018-11-17 22:11:16 +0000149 MBEDTLS_CIPHER_PSA_KEY_UNSET = 0,
Hanno Becker9de97d72018-11-19 14:05:48 +0000150 MBEDTLS_CIPHER_PSA_KEY_OWNED, /* Used for PSA-based cipher contexts which */
151 /* use raw key material internally imported */
Gilles Peskine11392492019-05-27 14:53:19 +0200152 /* as a volatile key, and which hence need */
153 /* to destroy that key when the context is */
154 /* freed. */
Hanno Becker9de97d72018-11-19 14:05:48 +0000155 MBEDTLS_CIPHER_PSA_KEY_NOT_OWNED, /* Used for PSA-based cipher contexts */
Gilles Peskine11392492019-05-27 14:53:19 +0200156 /* which use a key provided by the */
157 /* user, and which hence will not be */
158 /* destroyed when the context is freed. */
Hanno Becker19086552018-11-17 22:11:16 +0000159} mbedtls_cipher_psa_key_ownership;
160
Gilles Peskine449bd832023-01-11 14:50:10 +0100161typedef struct {
Hanno Beckeredda8b82018-11-12 11:59:30 +0000162 psa_algorithm_t alg;
Andrzej Kurek03e01462022-01-03 12:53:24 +0100163 mbedtls_svc_key_id_t slot;
Hanno Becker19086552018-11-17 22:11:16 +0000164 mbedtls_cipher_psa_key_ownership slot_state;
Hanno Becker6118e432018-11-09 16:47:20 +0000165} mbedtls_cipher_context_psa;
166#endif /* MBEDTLS_USE_PSA_CRYPTO */
167
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200168extern const mbedtls_cipher_definition_t mbedtls_cipher_definitions[];
Paul Bakker5e0efa72013-09-08 23:04:04 +0200169
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200170extern int mbedtls_cipher_supported[];
Paul Bakkerfab5c822012-02-06 16:45:10 +0000171
Dave Rodgman3b46b772023-06-24 13:25:06 +0100172extern const mbedtls_cipher_base_t *mbedtls_cipher_base_lookup_table[];
Dave Rodgmande3de772023-06-24 12:51:06 +0100173
Paul Bakker8123e9d2011-01-06 15:37:30 +0000174#ifdef __cplusplus
175}
176#endif
177
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200178#endif /* MBEDTLS_CIPHER_WRAP_H */